Classic Realcent Archives
Classic Realcent Archives
Home | Profile | Active Topics | Active Polls | Members | Private Messages | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Bullion Coins and Metals Investing Forums
 Copper Penny Bullion Investing
 Hacking Coinstar
 Forum Locked
 Printer Friendly
Author Previous Topic Topic Next Topic  

Canadian_Nickle
Penny Hoarding Member


Canada
938 Posts

Posted - 03/01/2007 :  19:09:01  Show Profile Send Canadian_Nickle a Private Message
The ultimate guide to hacking a CoinStar machine
2-3-07
Introduction
So, you go digging through your couch and you find somewhere around $200 in loose change and you REALLY don't want to count all of that yourself. Fortunately, god invented CoinStar to do that for you. Unfortunately, CoinStar charges you somewhere around 9% for its services. This is why you want to learn how to hack a CoinStar.

This is a really simple hack, so you won't be seeing too many pictures.

Background
Recently, CoinStar started a campaign where they won't charge you any fee if you turn your coins into iTunes gift cards, Amazon gift cards, or Virgin mobile cards. The machine doesn't actually give you any cards, but rather PINs which can be typed in on the sponsor's site and redeemed for their value. This works because the CoinStar machine has the power of the internets.

How to do it
This is really quite simple. Follow the directions as usual, but when it asks how you would like your money, make sure to pick the iTunes gift card. After it counts all of your change, the machine will ask you how much of your money you want as a gift card and how much you want as cash. Go ahead and set it all to gift card. Now, before proceeding, you need to find a way to unplug the phone jack from the back of the machine. I'm lucky because the wall phone jack for my local CoinStar is at about shoulder height right next to the machine.

Now the poor machine is in quite a pickle. It already has all of your change, and it can't give that back to you. It can't give you an iTunes card either. It could give you cash, but it's not going to lay that 9% fee on because you obviously didn't agree to that when you put your change in the machine. What can it do? Give you cash for FREE. After a few minutes of trying, it will simply give up and just give you a slip which can be redeemed for cash at the store customer service counter.

Conclusion
This little trick worked for me, so go ahead and give it a shot. Oh, and I'm supposed to tell you that I didn't think of this one. My good friend Collin over at Virtual Fresh Air thought of it, but he was too lazy to write it up.




HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  19:10:12  Show Profile Send Canadian_Nickle a Private Message
Note: Unfortunately, this doesn't work in Canada, because we have no option to get gift cards - just have to eat the fee.

HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  19:12:44  Show Profile Send Canadian_Nickle a Private Message
Then of course is the ‘ol 1¢ trick. I believe this was posted in 2600, sorry I don’t remember who wrote it. The way this trick works is you put in 1¢ (0.01) and cash out. The machine gives you a receipt for 1¢ (0.01) because there is no way to take 9% from a penny. This is all fine and good, but it will take quite a bit of time — Not to mention you can only use pennies and you have to hand the cashier 40 billion receipts. But it is an interesting hack, so I mentioned it here.

HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  19:14:26  Show Profile Send Canadian_Nickle a Private Message
And then is the post office. In most post offices, located in the lobby is an automated stamp vending machine. The interesting thing about this vending machine, is it gives you your change in Dollar and Fifty-Cent coins! So if you have some change you would like to ..um.. “change” go to the post office at around Midnight (or when the PO is really dead) and find the stamp machine. Pumped in all of your pennies, nickels, dimes, and quarters. I selected to buy one 39 cent stamp and hit the coin return.


HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  19:20:18  Show Profile Send Canadian_Nickle a Private Message
CoinStaris a network of “self-service coin counting machines located at the front entrances of leading supermarkets nationwide” according to their corporate website. CoinStar machines will count your change and spit out a receipt telling you how much money you tossed in (minus their service charge which is currently 8.9% in the US). Take the receipt to the register and they’ll give you cash so you don’t have to count and roll your change.When CoinStar started several years ago a few friends and I thought it was a great way to annoy the cashiers we didn’t like. We’d go to the machine, throw a penny in, go up to the register with the receipt, and get the penny back from a very irritated cashier. It wasn’t until this year that I realized I could peer into how it worked and see what was behind it and how it might be vulnerable.I went out to the supermarket and started the very slow, methodical process of reverse engineering the receipts. I threw in a penny and got the receipt, then I did it again, then with two pennies, three pennies... by the end of it I had about 10 - 15 receipts that were just loaded with data I could use.When I got home I looked at the receipts and noticed several things. First I noticed (obviously) the barcode. I scanned the receipt for numbers that matched the numbers in the bar-code and I found the following:• The first three digits were always “040”• The next four digits are the transaction ID (this is also located on the bottomof the receipt)• The next five digits represent the amount of money you put in in pennies• The last digit looked like it could be a checksum digit of some sortI couldn’t figure out the pattern in the last digits so I hopped online and started looking up barcode formats. After a few minutes I came across a webpage that had a very in depth explanation of EAN-13 (You must be logged in to see this link.). EAN-13 is the barcode for-mat used in the US and Europe in most retail stores. The format is very well defined and almost every barcode scanner you’ll see today can read them. A normal EAN-13 barcode is broken up into four sections:- Number system (first two digits)- Manufacturer code (next five digits)- Product code (next five digits)- Check digit (last digit)Now I had enough information to generate that last digit so I wrote a script to generate the check digit for a receipt and tried it on my CoinStar data. To my surprise the first receipt didn’t match and neither did the second. I realized that CoinStar borrowed the EAN-13 specification but broke the check digit scheme by implementing their own. ::sigh:: Something else to reverse engi-neer...Let’s take a look at one of my one penny barcodes:0 409705 000017A BCDEFG HIJKLMPERL CORNERHacking CoinStarby ntheory

HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  20:00:18  Show Profile Send Canadian_Nickle a Private Message
PatentView/EP1131697
Software Patent: Voucher coding for self-service coin discriminator
Table of contents:

Bibliography
Abstract
Description
Claims
Comment
Sources
Docomeents at the EPO publications server

Bibliography
Title
Voucher coding for self-service coin discriminator

Title - german
Gutscheinkodierung fÜr selbstbedienungs-mÜnzprÜfvorrichtung

Title - french
Codage de bons pour trieur de monnaie libre-service

EP Status
Pending application

Applicant
Coinstar inc (US)

Inventors
Gerrity, Daniel, A. (US); Beach, Kirk (US)

ECLA
G07D7/00D4; G07F7/00B; G07F7/04; G07G5/00

IPC
None

Priority
WO1999US24881 19991021; US19980178441 19981023

Designated countries
AT, BE, CH, DE, DK, ES, FR, GB, GR, IE, IT, LI, LU, MC, NL, PT, SE, FI, CY

Domains


Equivalents
WO25201-A1, EP1131697-A1, US6116402-A1, GB2343978-A, CA2348918-A1, CA2288511-A1

Filing date
1999-10-21

Publish date
2000-05-04

Grant Date
-

Publication no.
EP1131697

Application no.
EP19990955153 19991021


Abstract
A system which assists in detecting alteration of value docomeents or transmissions, such as a coin counter voucher is provided. Voucher information such as the voucher value is included in the voucher in an encrypted or otherwise modified form. When the voucher is presented for redemptions, the encrypted information is decrypted and compared to independently available voucher information. Failure of the information to match indicates that the voucher has been altered or should otherwise be further checked.


Description

Description of corresponding docomeent: US6116402


Cross-reference is made to U.S. application Ser. No. 08/883,780 and to U.S. application Ser. No. 08/689,826 filed Aug. 12, 1996 for coin counter/sorter and coupon/voucher dispensing machine and method, which is a continuation of U.S. application Ser. No. 08/255,539 filed Jun. 6, 1994, which is a continuing application of U.S. application Ser. No. 07/940,931 filed Sep. 4, 1992, all of which are incorporated herein by reference.

The present invention relates to a system for use in connection with a voucher and in particular, in connection with a voucher provided by a coin discriminator or counting mechanism to assist in detecting counterfeit or altered vouchers.

BACKGROUND INFORMATION

As described in U.S. Pat. No. 4,620,079 (incorporated herein by reference) a coin counter discriminator may be provided which receives and counts a plurality of coins and outputs a voucher, i.e. an output which itself has a value, related to the value of the an arbitrary number of multi-denominated counted coins, and which may be redeemed or exchanged for such value. In at least one application of a coin counter/discriminator, a number of such discriminators are positioned at retail locations and are configured to facilitate use by untrained users, particularly, ordinary untrained customers (as opposed to, e.g., employees) of the retail locations. Such users typically bring jars or other containers having a plurality of coins to the machine and dump the coins into a coin receiving region or area, in a random, jumbled mass, i.e. in a an unoriented fashion, with the coins typically being of a plurality of different denominations, and often including non-coin items, (paper items, lint, keys, screws, washers and the like) and/or foreign or other non-acceptable or undesirable coins. The machine is configured to discriminate and/or separate acceptable or desirable coins from other objects and also to discriminate one denomination of coin from another. The acceptable coins are counted, preferably by denomination, and a total of acceptable coins or a total value of acceptable coins is determined in this manner. The acceptable coins are retained, e.g. in a bin or bag within the discriminator and non-coin objects, unacceptable coins or undiscriminable objects are treated as waste and/or returned to the user.

Although there is no theoretical reason why such a coin discriminator could not be configured to output government-issued paper currency ("cash") in response to at least some of the counted and retained acceptable coins, in at least one embodiment it is preferred to output a voucher which includes written and/or encoded indicia which indicates, at least indirectly, information including the value which the voucher has. The value of the voucher is not necessarily equal to the "face value" of the counted acceptable coins. In one embodiment, the value of the voucher will be equal to the value of the counted coins minus a fee charged for the counting service. The fee may be calculated in a number of fashions such as a flat fee, a fee based on the number of coins counted, a fee which takes into consideration the types or denominations of the coins counted, a fee which is a percentage of the value or a weighted percentage based on type or denomination of coins, and the like. It would also be possible to provide a configuration in which the value of the voucher exceeded the face value of the counted coins e.g. as a promotion to encourage use of the machine for a limited period or to take into account coins which have an actual value exceeding the face value (e.g. recognized rare or otherwise valuable coins) and the like.

Although, in at least one configuration, a voucher is in the form of a paper slip printed with certain information, as described more fully below, the voucher may also take other forms including digital or electronic codes recorded on or transferred to a magnetic card, a smart card, transferred to a bank account or other account, e.g. over a preferably encrypted or otherwise secure telephone or other communication link, transferred to a computer such as a retail location "back room" computer or other computer (e.g. to credit a user's account or provide a credit against purchases and the like).

After the voucher is output, in at least some systems a user will use or obtain the value of the voucher e.g. by redeeming the voucher. It is anticipated that, typically, a user such as a retail customer will present the voucher to a retail cashier (e.g. the cashier at a grocery store checkout location), often as part of a purchase transaction, and the retail cashier will redeem the voucher by paying the voucher in cash or by providing a credit for the amount of the voucher against purchases made by the customer.

In this regard, it can be seen that the voucher itself is treated as having value and accordingly, there is a potential for unscrupulous individuals to obtain or devise a counterfeit, duplicate or altered voucher in order to obtain value to which they are not entitled. For example, some individuals may attempt to make one or more photocopies, or otherwise duplicate a voucher and present it for redemption. Some individuals may attempt to counterfeit an entire voucher, such as by drafting or composing an image of a voucher. Some individuals may alter a legitimate voucher (or an image of a legitimate voucher) e.g. changing the amount or value indicated or encoded on or in the voucher. Accordingly, it would be useful to provide a system which assists in detecting duplicate, counterfeit or altered vouchers.

In a number of situations, it is desired to provide for relatively rapid redemption or other processing of presented vouchers, in order to avoid customer ill will or excessive employee time that could be the result of excessively-long voucher processing. In a number of situations, voucher processing is facilitated with the use of store checkout equipment such as checkout (point-of-sale or "POS") computers, scanners and the like. However, modifications of such equipment to provide for additional functions can involve additional programming time, can increase execution or processing time, can impose extra computing burden on processors in such systems and may require linking the POS system to an external system, thus involving additional hardware and requiring extensing programming and/or system configuration. Accordingly, it would be advantageous to provide a system for detecting duplicate, counterfeit, or alternate vouchers which can achieve rapid voucher processing without undue burden on existing computer, scanning or other equipment at retail locations.

In many retail locations, checkout equipment includes the capability of bar code scanning e.g. for identifying merchandise. Typically, the associated software is configured to recognize bar codes according to a standard bar code system such as a system promulgated by the Uniform Code Council Inc. of Dayton, Ohio. Accordingly, it would be useful to provide a system for detecting counterfeit, duplicate or altered vouchers which was at least partially (preferably, fully) compatible with a standard bar code system.

SUMMARY OF THE INVENTION

The present invention includes the recognition of certain problems including problems generally as discussed above. According to one embodiment, a voucher includes information usable for ascertaining the validity of a voucher, but which is provided preferably in an altered form such as being permuted, shifted, encrypted or the like. In this way, a person who alters a voucher, such as by changing the printed or displayed amount, cannot avoid detection of the alteration without also knowing how to permute, shift, encode, etc. the information used for validation. Preferably, any permutation, shifting, encryption or the like which is used is of a nature that once the procedure for reversing the permutation, shifting or other encryption is known, execution of the reverse processes (e.g. reverse shifting, decryption), can be performed relatively easily (e.g. automatically, by a computer) so as to impose relatively minor computing or time burdens on the validation process.

Unless otherwise indicated, encryption refers generally to altering the form or appearance of information (preferably so as to prevent at least the casual viewer/reader from understanding the information) in such a way that it may be manipulated to recover the original information but such that it is not readily apparent, from the altered information, how the altered information is related to the original information. Encryption, in this sense, includes, but is not limited to, permuting digits or characters of a field, adding, subtracting, multiplying or dividing (to or by) key values, performing binary operations on digital fields, performing operations on concatenated fields and the like.

In one embodiment, a voucher includes a printed, human-readable indication of an amount, and, preferably includes a transaction number or other identifier number. An encoded version of the amount, transaction number, transaction date, expiration date, retail location, or combination(s) thereof is also printed or encoded, preferably as at least part of a bar code (to facilitate validation and redemption). When the voucher is presented, the bar code or other encoded number is decrypted or otherwise processed to recover the value and transaction number. The value and/or transaction number can then be used as part of a validation process such as by comparing the recovered encoded value to the printed value or transaction number and/or checking the transaction number or the like against a negative checklist (i.e. a list of transaction numbers which have already been redeemed or are otherwise suspect). Vouchers which are not validated can be refused payment or can be more closely inspected or provided with an identification process, such as recording the customer's driver's license number, getting manager approval, and the like.

A number of systems can be used for altering or encoding values, transaction numbers or combinations. Two basic (not necessarily exhaustive) classes of encryption include using a not-generally-known algorithm, and a known key, and using a not-generally known key with a known algorithm. In one embodiment, one or more tables are used e.g. to control digit shifting and/or digit or value addition/subtraction. By basing such processes on tables, time and computing burdens are reduced (as compared with, e.g., more computationally burdensome processes such as standard encryption/decryption) and it becomes relatively straightforward to change the alteration system, (e.g. by downloading one or more new value tables). Other types of manipulation can be used such as digital/binary conversions and the like. In this way, many types of voucher alterations or fabrications become apparent upon an attempted redemption and monetary losses attributable to such alterations or fabrications are reduced or eliminated.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts the appearance of a voucher of a type which may be used in accordance with an embodiment of the present invention;

FIGS. 2A-C are flowcharts depicting voucher generation validation and redemption according to certain embodiments of the present invention;

FIG. 3 is a flowchart depicting a transaction number/value manipulation procedure according to an embodiment of the present invention;

FIG. 4 depicts a transaction number/value manipulation procedure according to an embodiment of the present invention;

FIG. 5 depicts a store system including a coin discriminator of a type usable in connection with embodiments of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

FIG. 1 shows the appearance of a voucher of a type which may be used in connection with embodiments of the present invention. The present invention can be used with a number of types of paper or non-paper (such as electronic) vouchers. In the example of FIG. 1, the voucher is a paper voucher with a number of indicia printed thereon. Some of the indicia may be pre-printed (before a transaction occurs) or the entire voucher may be printed after coins are counted. In the depicted example, the voucher includes a coin discriminator or system logo or name 112, the name and address of the retail location where the discriminator is located 114, a tally of the number of various coin denominations counted 116, an indication of the total value of coins counted 118, an indication of the processing fee subtracted 122, the value or worth of the voucher 124a,b typically equal to the coin total 118 minus the processing fee 122, instructional information regarding how to redeem the voucher 126, a transaction number, a transaction date and time 132, a store message 134, a store or retail location logo 136 and a bar code 138. If desired, background printing 142 and/or microprinting and/or watermarking, encoded fibers and the like can be printed or provided as part of the paper or pre-printed, e.g. to assist in distinguishing counterfeit vouchers.

As is typical with bar codes, the bar code 138 is accompanied by a human readable, digital representation 144 of the number represented by the bar code 138. In the depicted embodiment, the 13-digit bar code 144 includes four fields--a two digit value indicative of the number system and type of item encoded (e.g., 2 equals random weight item, 3 equals National Drug Code, and the like) specified by the Uniform Code Council 146. A five-digit indication of the transaction number 148 (e.g. equal to item 128), a five-digit encrypted or encoded item 152 as described more thoroughly below and a check digit, calculated according to the Uniform Code Council rules (used, e.g., in verifying that the bar code is scanned correctly).

In one embodiment, the five-digit encrypted number 152 is an encryption of the voucher value 124a,b. Examples of possible encryption procedures are described below and numerous other types of encryption can be used. In any case, unless a potential counterfeiter knows how to properly encrypt the value, when a voucher with an altered voucher value 124a,b is presented, it is possible to use a verification procedure at the checkout stand to detect such alternation of the voucher by decrypting the encrypted value 152 and comparing to the value 124a,b printed on the face of the voucher. If only the value printed on the face of the voucher 124a,b is altered, without changing the encrypted value portion of the bar code 138 and/or the corresponding printed encrypted value 152, such alteration of the voucher value 124a,b can be detected. Similarly, if both the voucher value (unencrypted) 124a,b is altered and the encrypted value 152 is altered, but the alteration of the encrypted value does not provide, upon the decryption, a value equal to the unencrypted voucher 124a,b, again the attempted alteration can be detected.

FIG. 2A shows the process of using a voucher with an encrypted value for use in detecting voucher alterations. In the embodiment of FIG. 2A, a customer normally inputs coins 212, and the coin discriminator outputs a voucher 214, similar to that depicted in FIG. 1. At some point, the customer presents the voucher for redemption 216. In the embodiment of FIG. 2A, it is possible to validate the voucher 218 by using the encrypted value voucher 152. In this embodiment, in order to achieve a voucher validation, the encrypted number 99522152, is decrypted preferably by automatic or manual entry of the encrypted number 152 into a computer, such as a retail location checkout computer which, as depicted in FIG. 5, is preferably coupled to a retail location back room computer 512 which contains decryption tables or other information or procedures for decrypting. If desired, it is possible to perform the step of validating the voucher 218 on only some presented vouchers, such as performing random or spot-checking of vouchers, checking only vouchers which are for an amount greater than a threshold amount, or which are older than a predetermined time or date.

The decrypted voucher value based on the encrypted value 152 is then compared, either automatically (e.g. by comparison in the point-of-purchase or back room computer) or manually (e.g. by displaying the decrypted amount which the clerk can visually compare with the value 124a,b printed on the voucher) in order to validate the voucher 218. Whereupon, if the voucher is valid, it is redeemed 222.

It is believed useful to base the altered or encrypted validation information at least partially on the voucher value, particularly since it is likely a voucher that has been altered will involve alteration of the value. However, it is also possible, in addition to or in place of using the voucher value, to use other numbers or information associated with the voucher such as a transaction number, date and time, store number or other identifier, a computer-generated unique (or pseudo-unique) key value, and the like. In configurations in which a customer number (or other identifier) is associated with a voucher (such as when the coin discriminator is configured to accept a "frequent-customer card," credit card, debit card or the like identifying a customer or to receive identification information input by the customer) the customer identification, preferably altered or encrypted, can be provided as part of the voucher information and used e.g. to determine whether the person redeeming the voucher was the person who was identified on the voucher.

In the embodiment of FIG. 2B, the voucher is configured to include machine-readable information 214'. By providing information in machine-readable form, it is possible to perform some or all steps involved in the voucher verification or redemption in an automatic fashion, e.g. without requiring keyboard or other manual output of voucher information. In the embodiment of FIG. 2B, the machine-readable information is read 224 after the customer presents the voucher for redemption, and preferably, the machine-readable information is used during the validation 218 or redemption 222.

In procedures 2A and 2B, there is no need for the coin counter 508 to be coupled to the back room computer or cashier's station, i.e. the coin counter 508 can be a "standalone" device. In the embodiment of FIG. 2C, the coin counter or discriminator 508 is coupled by communication link to the retail location back room computer 512 as depicted in FIG. 5. The coin discriminator sends electronic information to the backroom computer 226 which includes information that can be used during a validation step. The information to be used in a validation step can include many of the types of information depicted in FIG. 1 including the unencrypted value 124a,b, the encrypted value 152, the transaction number 128, the time and date 132, the store identification information 114 and the like. In the embodiment of FIG. 2C, validation can include comparing information printed or encoded on the voucher with the information that was transmitted to the back room computer. For example, alterations in the unencoded value 124a,b can be automatically detected by comparing 228 a voucher value indicated by or encrypted in the bar code 138 with the value stored in the back room computer 512 corresponding to the particular transaction number or time of the voucher.

FIG. 3 depicts one method for encrypting a voucher value 124a,b. The example of FIG. 3 relates to a voucher having a maximum of five decimal digits (i.e. a voucher with a value no greater than $999.99). In some configurations, vouchers having a value greater than the maximum encodable or encryptable value (in this example, $1,000 or more) can be provided with a special encryption code (e.g. 0) requiring, e.g., manual verification or validation of a voucher.

In the example of FIG. 3, first and second tables are provided, giving numerous possible encryption values for use in encrypting. Tables I and II below, provide examples of such tables.

<tb> TABLE I
<tb>______________________________________
<tb>(rearrangement table)
<tb> Last Digit
<tb> Key
<tb>______________________________________
<tb> 0 32541
<tb> 1 51432
<tb> 2 42153
<tb> 3 25341
<tb> 4 14352
<tb> 5 24513
<tb> 6 31452
<tb> 7 14253
<tb> 8 51423
<tb> 9 25134
<tb>______________________________________

<tb> TABLE II
<tb>______________________________________
<tb>(encryption key)
<tb> Last Digit
<tb> Key
<tb>______________________________________
<tb> 0 95175
<tb> 1 36987
<tb> 2 24789
<tb> 3 12547
<tb> 4 63257
<tb> 5 58214
<tb> 6 27691
<tb> 7 35896
<tb> 8 12345
<tb> 9 85214
<tb>______________________________________

In these examples, there are 10 possible encryption values that may be used, and accordingly, a table index having 10 possible values is appropriate. In the example of FIG. 3, the last digit of the transaction number is employed as the table index value. Accordingly, the last digit of the transaction number 128 is used as an index to the encrypt rearrangement table (Table I) to obtain a five-digit encrypt rearrangement vector 312. In the example of FIG. 1, the last digit of a transaction number 128 is 6, and accordingly, the encrypt rearrangement vector to be used, as shown in Table I, is "31452". The vector is used to form a first altered five-digit number whose Nth digit is the Mth digit of the five-digit voucher value 124a where M is the value of the Nth digit of the encrypt rearrangement vector 314. In the present example, the first altered five-digit number would thus be 72931. Note that this value is the five digits of the voucher value 124a with the digits rearranged so that the first digit of the first altered number is the third digit of the voucher value, the second digit of the first altered number is the first digit of the voucher value, the third digit of the altered number is the fourth digit of the voucher value, the fourth digit of the first altered number is the fifth digit of the voucher value, and the fifth digit of the first altered number is the second digit of the voucher value, in accordance with the rearrangement vector 31452.

According to the procedure of FIG. 3, a second encryption step, using Table II is then applied. Again, the last digit of the transaction number ("6" in the present example) is used as an index to the add/subtract value table (Table II) to obtain a five-digit add value, namely 27691. Each digit of the add value is separately added to the corresponding digit of the first altered number (i.e. digit-wise addition) without any carry (i.e. using modulo 10 addition) resulting in a second altered number. In the present example, digit-wise, modulo 10 addition of 27691 plus 72931 yields the five-digit number 99522, which is then the number printed on the voucher 152 as depicted in FIG. 1. Accordingly, steps 312 through 318 result in an encryption procedure 308 which may be performed in the coin counter computer 508 or a coupled computer such as a back room computer 512.

When the voucher of FIG. 1 is presented for redemption, preferably the bar code 138 is scanned, and the five-digit encoded value 152 is used for validation purposes. To perform the validation 332, the last digit of the transaction number 128 ("6" in the present example) is used as an index to the add/subtract value table (Table II) which is stored in or available to the computer at the cashier station 504 where the voucher is presented. Because the decryption process involves reversing the addition step (i.e. subtracting the same number that was previously added) the add/subtract value table used for decryption purposes can be identical to that used (Table II) for encryption. In this case, using the last digit of the transaction number ("6") as an index to the add/subtract value table yields 322 a five-digit subtract value, in this case 27691. The five-digit subtract value is then subtracted from the second altered number (i.e., in the present example, subtracted from 99522) on a digit-wise basis without borrow (i.e. using modulo 10 arithmetic) to form a third altered number 324 which, in this case, yields the number 72931. Again, the last digit of the transaction number ("6") 128 is used as an index to a decrypt table to obtain a five-digit decrypt rearrangement vector (which, in this example, is 25134) 326. Although, to provide for relatively rapid computational speed, it is preferred to store a decrypt table, it is also possible to derive or compute the proper decrypt rearrangement vector from the corresponding encrypt rearrangement vector. In the present example, the Mth digit of the decrypt rearrangement vector will be equal to P where P is the ordinal number (counting left to right) of that digit of the corresponding encrypt rearrangement vector which equals M. The decrypt rearrangement vector is used to recover the original vector or voucher value 124 as a number whose Nth digit is the Nth digit of the third altered number, where M is the value of the Nth digit of the decrypt rearrangement vector 328.

FIG. 4 depicts another decryption scheme that can be used to encrypt and decrypt voucher information. In the example of FIG. 4, binary representations of voucher information, in this case, binary representations of a transaction number, store ID number, cyclic redundancy check (CRC) number and voucher value are concatenated to form, in this example, a 33-bit concatenated binary value 412. This concatenated binary value is exclusive ORed with an encryption binary value to form a 33-bit altered binary value 414. The encryption binary value can be any of a number of binary numbers, provided the encryption binary number is also available during the decryption process. In one embodiment, the encryption binary value is based on the store identification number (since this will be available to the store computer upon an attempted redemption). The 33-bit altered binary value is then converted to a decimal altered value using normal binary-to-decimal conversion resulting in, e.g., a ten-digit decimal value which is then printed or encoded on the voucher 416. The encryption procedure 408 can be performed in the coin counter 508 or the coupled back room computer 512. When the voucher is presented for redemption, the decimal altered value from the voucher is input (either manually, e.g. using the keyboard, or automatically, e.g., by scanning a bar code) and the decimal value is converted to a binary altered value such as a 33-bit binary altered value 418.

The binary altered value thus obtained is exclusive ORed by the decryption binary value (such as decryption binary value based on the store identification number in the example described above) to recover the concatenated binary value 422. As noted above, the concatenated binary value contains fields having binary representations of the transaction number, store ID, CRC, and voucher values (e.g.). Accordingly, these binary fields may be segregated 424, and the various values may be used for validation and similar purposes such as performing data integrity checks (such as checking the CRC 426) and/or validating the voucher using, e.g. the decoded voucher value in a fashion similar to that described above 428. If desired, the CRC can be used to verify a sucessful conversion, thus facilitating the use of multiple converions e.g. over a time perios. For exarnple, it is possible to use the month-of-issue of the voucher to perform a look-up in the transpostion table, or as part of the binary encryption key. It is also possible to use te store number as all or part of the encryption key, e.g. to aid detection of cross-shopper redemption attempts.

The format of the voucher and/or format or standards for bar code can impose restraints or limits on the number of digits available for various pieces of information. For example, according to one bar code standard, a total of ten decimal digits may be available for encoding information at the discretion of the voucher designer. For example, in the configuration of FIG. 1, ten decimal digits (148 and 152) are free to be provided by the coin discriminator. The manner is which these digits are assigned to various fields will determine the range of values available for those fields. For example, in the configuration of FIG. 1, five decimal digits are designated for expressing the voucher value so that the maximum voucher value that can be encoded under this system would be $999.99.

In the embodiment of FIG. 4, if it is assumed that ten decimal digits are available for conveying the encrypted binary value, this essentially means that the maximum number of binary bits available to hold the various (concatenated) binary fields will be 33 (since the maximum number encoded by 34 bits (2@34) would require at least 11 decimal digits alternatively (log2 (9,999,999,999)=33.219). In this case, the manner in which the 33 available binary digits are distributed among the various fields determines the maximum value or range for that field. For example, if 16 of the 33 bits are used for holding the binary equivalent of the voucher value, the maximum voucher value that can be indicated will be $655.35 (2@16 -1=65,535). Accordingly, if the scheme of FIG. 4 is to be used in connection with a bar-coded value provided in accordance with Uniform Code Council standards, the binary field sizes should be judiciously selected to provide the desired or necessary ranges for various items. In one embodiment, in addition to the bits provided for the voucher value, seven bits are used for the transaction number (providing a range of 0-128, decimal) 5 bits provided for the store ID number (providing a range of 0-32, decimal) and 5 bits for a CRC check value. Although this scheme provides a smaller range for the transaction number than the range of the configuration of FIG. 1 (which provides five decimal digits for the transaction number) it is believed that in some situations, a relatively smaller transaction value range will be acceptable, particularly if the transaction number can be combined with other information such as store location and/or date/time. By using binary fields for encoding voucher information as described in connection with FIG. 4 regardless of their correspondence to various decimal digits, it can become possible to encode a relatively large number of different types of fields or information.

In light of the above description, a number of advantages of the present invention can be seen. The present invention provides a way to detect at least some forms of voucher counterfeiting, alterations, duplication, fabrication, and the like e.g. by including encoded or encrypted voucher information which cannot be readily replicated and/or using encryption/decryption schemes which are relatively resistant to being broken. Preferably the encryption or encoding can be accomplished without requiring, for their decryption, time or computing resources beyond those available in normal retail transactions or facilities. The present invention is able to provide detection of voucher alterations, duplications and the like in a manner which is partially or fully automated so that time or manpower investments need not be made in manually entering data or validating or redeeming vouchers. Embodiments of the present invention can be implemented in a fashion consistent with standard retail establishment procedures or equipment such as in a fashion consistent with Uniform Code Council bar code or other standards, preferably in a manner such that the same scanning hardware and/or software used for normal retail procedures such as checkout procedures can be used in implementing embodiments of the present invention substantially with little or no modification, e.g. requiring only data needed to recognize particular types of bar codes and to branch to voucher verification, redemption, or other voucher handling routines. The procedures used in the encryption 308 and decryption 332 of the procedure of FIG. 3 involve processes which are, for typical computing devices, relatively rapid in terms of execution time, such as table lookup procedures, add/subtract procedures, and digit shift and rearrangement procedures. Accordingly, it is believed that one of the potential advantages of a procedure similar to that depicted in FIG. 3 is that it can be implemented on cashier station computers 504 in existing configurations which may have relatively low-powered computers such as those based on 80286 processors. In this way, it is believed feasible to implement the present invention without imposing significant additional wait or processing time to achieve voucher validation or redemption.

It is believed that the difficulty of breaking an encryption code according to the present invention is especially high in the case of coin counter vouchers since legitimate coin counter vouchers typically tend to have a relatively small range of values (i.e. few legitimate vouchers with values greater than a few tens of dollars would typically be available to a putative counterfeiter). In general, the smaller the range of encrypted data available to a code-breaker, the more difficult it is to break the code. A number of variations and modifications of the invention can be used. Although features of the present invention are described in connection with an example in which a voucher is a printed voucher (e.g. magnetic cards, electronic transfers and the like), some or all features of the present invention can be used in connection with at least some other types of vouchers (e.g. magnetic cards, electronic transfers and the like), as will be apparent to those of skill in the art after understanding the present disclosure. Although particular encryption or alteration schemes have been described and are believed to be particularly useful especially in those situations in which computational time or power available for decryption and/or validation are limited, other encryption/decryption schemes can be used, including those generally known for data encryption such as RAS, DES, public/private key systems, and the like. Although an encryption system has been described which involves the step of adding and a step of rearranging, numerous alterations and variations are possible such as performing the steps in a different order, interchanging addition and subtraction, using normal rather than modulo addition or subtraction (where sufficient digits are available), 1's complement and multiple keys. Although indexing to encryption value tables was described in connection with using a particular digit of transaction number as an index, it is possible to use different indices for the different tables (Tables I and II), or other indices can be used, including other digits of a transaction number, hashes or other modifications of a transaction number or digits thereof, other information in place of or combined with the transaction number (or digits thereof) such as the transaction date, time, location code, customer identification and the like. Preferably, in addition to or in place of, validating by comparing a decrypted voucher value with a printed (unencrypted) voucher value, a "negative check file" test is performed to identify vouchers which correspond to vouchers which have already been redeemed or may otherwise be suspect. For example, the negative check file may include transaction numbers, date-time information or other voucher identification information for previously redeemed vouchers at a particular store or vouchers redeemed within a certain interval of time, voucher identifiers known to be associated with vouchers previously altered or fabricated, or the like. Although examples described herein include encoding of all digits of a voucher value, it is possible to configure voucher validation procedures which provide encoding or encryption of only some digits of the value (or other field), such as a certain number of least significant or most significant digits, odd-numbered digits and the like. In these configurations, encoded selected voucher value digits cannot be used to, by themselves, indicate the value of the voucher, and accordingly, the full voucher value would need to be provided in another form such as being provided in a different field of the bar code, provided in a different region of the voucher, provided to the cashier computer through another route (e.g. by being sent from the coin counter to the back room computer and then to the cashier computer when the voucher is presented for redemption). In one embodiment, rather than performing a specific voucher validation step, it is possible to achieve many of the same benefits by always encoding or encrypting the voucher value and always redeeming a voucher in an amount equal to the value indicated by the decrypted voucher value, on the assumption that those attempting to alter the unencrypted value indicator 124a,b will fail to realize that the redemption will be based on decryption of an encrypted value (and thus will fail to alter the encryption value) and/or will fail to understand how to alter the encrypted value (will fail to understand the encryption procedure) in such a way as to consistently achieve a goal of increasing a voucher value in a manner likely to escape notice. Although it is preferred to use a programmable computer for encrypting, decrypting and/or validating, it is possible to use other devices such as hand-wired logic devices, programmable logic arrays, application-specific integrated circuits and the like.

Although the present invention has been described in connection with a coin discriminator, it can be used in other contexts such as providing encoded, encrypted or other altered information on printed or electronic coupons, tickets, gaming items or tokens, passes, checks, product or service bar codes, or other docomeents or communications, including electronic communications.

The present invention, in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. The present invention, in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g. for achieving ease and reducing cost of implementation.

The foregoing discussion of the invention has been presented for purposes of illustration and description. The foregoing is not intended to limit the invention to the form or forms disclosed herein. Although the description of the invention has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the invention, e.g. as may be within the skill and knowledge of those in the art, after understanding the present disclosure. Those of skill in the art will, after understanding the present disclosure, know how to provide hardware and software for implementing, making and using the invention. It is intended the appended claims be construed to include alternative embodiments to the extent permitted.



Claims

Claims of corresponding docomeent: US6116402


What is claimed is:

1. Apparatus for providing a voucher comprising:
a coin discriminator which receives randomly oriented coins including a plurality of acceptable coins, all in one place, and discriminates different denominations of said acceptable coins, said coin discriminator including a computer which outputs an indication of a first value related to the value of said acceptable coins; and
an output unit which provides at least first output which includes an encrypted version of said first value.

2. Apparatus, as claimed in claim 1, wherein said first output includes an encrypted version of transaction identifying information.

3. Apparatus for providing a voucher comprising:
a coin discriminator which receives randomly oriented coins including a plurality of acceptable coins, all in one place, and discriminates different denominations of said acceptable coins, said coin discriminator including a computer which outputs an indication of a first value related to the value of said acceptable coins; and
a printer, controlled by said computer to print a voucher for said first value, including printing of an encrypted version of first information, said first information including said first value.

4. Apparatus, as claimed in claim 3, wherein said printer is controlled to print machine-readable information, including said encrypted version.

5. Apparatus, as claimed in claim 3 wherein said encrypted version includes numerical digits obtained from said first information by a process that includes shifting the digit order and adding at least a first value.

6. Apparatus, as claimed in claim 3, wherein said first information includes transaction identifying information.

7. Apparatus, as claimed in claim 6 wherein said transaction identifying information is selected from the group consisting of a transaction number, a date, a time and a location code.

8. A process for exchanging coins for paper currency comprising:
a) automatically counting a plurality of coins to determine a first value related to the value of said plurality of coins;
b) printing a voucher which includes a human readable indication of said first value and an encrypted version of said first value;
c) presenting said voucher to a cashier for redemption;
d) decrypting said encrypted version to obtain an decrypted value and redeeming said voucher for an amount equal to said decrypted value.

9. A process, as claimed in claim 8 wherein said voucher is redeemed if said decrypted value matches said human readable indication.

10. A process as claimed in claim 8 further comprising repeating steps a, b and c to provide a second voucher; and
decrypting said encrypted version on said second voucher if said value exceeds a predetermined amount or if said voucher is older than a predetermined age.

11. A process as claimed in claim 8 wherein said step of printing includes printing a machine-readable representation of at least said encrypted version.

12. A process as claimed in claim 8 wherein said step of printing includes printing a machine-readable representation of said encrypted version and of said first value and further comprising using a computer to decrypt said encrypted version and compare to said first value.

13. A process for providing a voucher comprising:
receiving, in a coin discriminator, randomly oriented coins including a plurality of acceptable coins, all in one place
discriminating different denominations of said acceptable coins to provide a first value related to the value of said acceptable coins; and
outputting an encrypted version of said first value.

14. A process as claimed in claim 13 wherein said step of outputting includes printing a bar code which represents said encrypted version.

15. A process as claimed in claim 13, wherein said step of outputting includes outputting an encrypted version of transaction identifying information.

16. Apparatus for providing a voucher comprising:
means for receiving randomly oriented coins including a plurality of acceptable coins, all in one place, discriminating different denominations of said acceptable coins and outputting an indication of a first value related to the value of said acceptable coins; and
means for calculating and outputting an encrypted version of said first value.

17. Apparatus as claimed in claim 16 wherein said means for calculating and outputting comprises means for printing a voucher, and further comprising
means for detecting alterations of said voucher.

18. Apparatus, as claimed in claim 17 wherein said means for detecting comprises means for decrypting said encrypted version and comparing to an unencrypted version.

19. Apparatus, as claimed in claim 18 wherein said unencrypted version is printed on said voucher.

20. Apparatus, as claimed in claim 16, wherein said means for calculating and outputting calculates and outputs an encrypted version of transaction identifying information.

21. A computer-implemented process for encrypting a coin-counting voucher comprising:
receiving, in a coin discriminator, randomly oriented coins including a plurality of acceptable coins, all in one place
discriminating different denominations of said acceptable coins to provide a first value related to the value of said acceptable coins;
permuting the digit order of a number which includes at least one of:
said first value; and
transaction identifying information to provide a first permuted number; and
adding a selected number to said first permuted number.

22. A process as claimed in claim 21 wherein said step of permuting digit order is performed in accordance with a permutation vector selected from a first table.

23. A process as claimed in claim 22 wherein said selected number is selected from a second table.

24. A process as claimed in claim 21 wherein said step of adding includes modulo digit-wise addition.

25. A computer-implemented process for encrypting a coin-counting voucher comprising:
receiving, in a coin discriminator, randomly oriented coins including a plurality of acceptable coins, all in one place
discriminating different denominations of said acceptable coins to provide a first value related to the value of said acceptable coins;
concatenating a binary representation of said first value with at least a second binary value to form a concatenated binary value;
performing a binary-to-digital conversion on said concatenated binary representation and outputting the resultant digital value.

26. A process as claimed in claim 25 wherein said second binary value includes a binary representation of at least one of a transaction number, a date, a time and a location code.



Comment

HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  20:08:41  Show Profile Send Canadian_Nickle a Private Message
United States Patent Application 20060219519
Kind Code A1
Molbak; Jens H. ; et al. October 5, 2006

--------------------------------------------------------------------------------
Coin counter/sorter and coupon/voucher dispensing machine and method


Abstract
A coin sorting and counting machine and a method for operating it to automatically dispense cash vouchers based on the value of the counted coins, manufacturers' coupons and store coupons. Coins are placed in a hopper tray. When the hinged tray is lifted, the coins travel through a waste management system and into the coin sorting and counting apparatus. The value of the coins and the number of coins within each denomination are displayed as the coins are counted. After sorting, the coins fall into a temporary holding area. At this point the transaction can either be canceled or accepted. If the transaction is canceled, the coins are returned. If the transaction is accepted, the coins fall into a storage area and the user is issued a cash voucher and a series of store coupons. Manufacturers' coupons are dispensed regardless of whether or not the transaction is accepted.


--------------------------------------------------------------------------------
Inventors: Molbak; Jens H.; (Portola Valley, CA) ; Sun; Vae E.; (Palo Alto, CA)
Correspondence Name and Address: PERKINS COIE LLP;PATENT-SEA
P.O. BOX 1247
SEATTLE
WA
98111-1247
US


Serial No.: 336413
Series Code: 11
Filed: January 20, 2006

U.S. Current Class: 194/346
U.S. Class at Publication: 194/346
Intern'l Class: G07F 1/04 20060101 G07F001/04



--------------------------------------------------------------------------------

Claims

--------------------------------------------------------------------------------


1.-34. (canceled)

35. A consumer coin counting machine, the coin counting machine comprising: an input region configured to receive a plurality of randomly oriented coins from a user; a coin discriminator configured to receive the coins from the input region and count the coins to determine a total; an intermediate holding area for at least temporarily holding the coins counted by the coin discriminator; a display device operably connected to the coin discriminator and configured to display at least one of the total and a value related to the total; and a user selection device, wherein the coins held in the intermediate holding area are returned to the user in response to receiving a first user input via the user selection device rejecting at least one of the total and the value related to the total, and wherein a redeemable voucher is dispensed from the coin counting machine in response to receiving a second user input via the user selection device accepting at least one of the total and the value related to the total.

36. The coin counting machine of claim 35 wherein the user selection device includes first and second buttons, wherein the coins held in the intermediate holding area are returned to the user in response to the user depressing the first button, and wherein the redeemable voucher is dispensed from the coin counting machine in response to the user depressing the second button.

37. The coin counting machine of claim 35 wherein the voucher is redeemable for at least one of cash and merchandize in a non-bank retail location in which the coin counting machine is located.

38. The coin counting machine of claim 35 wherein the voucher is redeemable for at least one of cash and merchandise for the value related to the total.

39. The coin counting machine of claim 35 wherein the display device is configured to display the total and the value related to the total, and wherein the value is less than the total.

40. The coin counting machine of claim 35 wherein the display device is configured to display the total and the value related to the total, and wherein the value is a set percentage less than the total.

41. The coin counting machine of claim 35 wherein the display device is configured to display the total and the value related to the total, wherein the redeemable voucher includes an indication of the total and the value related to the total, and wherein the value is less than the total.

42. The coin counting machine of claim 35 wherein the input region is configured to receive a plurality of randomly oriented coins of multiple denominations from a user, and wherein the display device is configured to display sub-totals for each of the individual coin denominations.

43. The coin counting machine of claim 35 wherein the redeemable voucher includes anticounterfeiting information.

44. The coin counting machine of claim 35 wherein the redeemable voucher includes a substrate, and wherein the coin counting machine further comprises a voucher printer configured to print at least one of the total and the value related to the total on the substrate in machine-readable form.

45. The coin counting machine of claim 35 wherein the redeemable voucher includes a substrate, and wherein the coin counting machine further comprises a voucher printer configured to print at least one of the total and the value related to the total on the substrate in bar code.

46. The coin counting machine of claim 35 wherein the input region includes a coin cleaning facility configured to separate non-coin items from the plurality of randomly oriented coin received from the user.

47. The coin counting machine of claim 35 wherein the input region includes at least one hole configured to separate non-coin material from the plurality of randomly oriented coin received from the user.

48. A consumer coin counting machine, the coin counting machine comprising: an input region configured to receive a plurality of randomly oriented coins from a user; at least one debris removal feature for separating foreign objects from the coins received from the user; a coin discriminator configured to receive the coins from the input region and count the coins to determine a total; an intermediate holding area for at least temporarily holding the coins counted by the coin discriminator; and a display device operably connected to the coin discriminator and configured to display at least one of the total and a value related to the total, wherein the coins held in the intermediate holding area are returned to the user in response to a first user input rejecting at least one of the total and the value related to the total, and wherein a redeemable voucher is dispensed from the coin counting machine in response to a second user input accepting at least one of the total and the value related to the total.

49. The coin counting machine of claim 48 wherein the debris removal feature includes a fan configured to blow light weight debris, such as lint and dust, away from the coins.

50. The coin counting machine of claim 48 wherein the debris removal feature includes at least one hole through which liquid can be flowed away from the coins.

51. A consumer coin counting machine, the coin counting machine comprising: an input area configured to receive multiple randomly oriented coins from a user; a coin discriminator configured to receive the coins from the input area and count the coins to determine a total; an intermediate holding area for at least temporarily holding the coins counted by the coin discriminator; a display device operably connected to the coin discriminator and configured to display at least one of the total and a value related to the total; and a voucher dispenser, wherein the coins held in the intermediate holding area are returned to the user in response to one user input rejecting at least one of the total and the value related to the total, and wherein a redeemable voucher is dispensed by the voucher dispenser in response to another user input accepting at least one of the total and the value related to the total.

52. The coin counting machine of claim 51 wherein the voucher is redeemable for at least one of cash and merchandize in a non-bank retail location in which the coin counting machine is located.

53. The coin counting machine of claim 51 wherein the voucher is redeemable for at least one of cash and merchandise for the value related to the total, and wherein the value is less than the total.

54. The coin counting machine of claim 51 wherein the display device is configured to display the total and the value related to the total, and wherein the redeemable voucher includes an indication of the total and the value related to the total.

55. The coin counting machine of claim 51 wherein the input region is configured to receive a plurality of randomly oriented coins of multiple denominations from a user, and wherein the display device is configured to display sub-totals associated with each of the individual coin denominations.

56. The coin counting machine of claim 51 wherein the redeemable voucher includes anticounterfeiting information.

57. The coin counting machine of claim 51 wherein the redeemable voucher includes a transaction number.

58. The coin counting machine of claim 51 wherein the redeemable voucher includes a substrate, and wherein the coin counting machine further comprises a voucher printer configured to print at least one of the total and the value related to the total on the substrate in machine-readable form.

59. The coin counting machine of claim 51 wherein the redeemable voucher includes a substrate, and wherein the coin counting machine further comprises a voucher printer configured to print at least one of the total, the value related to the total, and a transaction number on the substrate in bar code.

60. A method for counting coins, the method comprising: providing a coin counting machine, the coin counting machine having a coin input area, a coin discriminator that receives coins from the coin input area, and a coin holding area that receives coins from the coin discriminator; receiving from a user, in the coin input area, a plurality of randomly oriented coins of multiple denominations; transferring the plurality of coins from the coin input area to the coin discriminator, and discriminating the coins to determine a total; transferring the plurality of coins from the coin discriminator to the coin holding area, and temporarily holding the coins in the coin holding area; displaying at least one of the total and a value related to the total to the user; dispensing a redeemable voucher to the user when the user accepts at least one of the total and the value related to the total; and returning the coins held in the coin holding area to the user when the user rejects at least one of the total and the value related to the total.

61. The method of claim 60 wherein discriminating the coins to determine a total includes sequentially rolling the coins past a coin sensor.

62. The method of claim 60 wherein the coin counting machine includes first and second buttons, wherein dispensing a redeemable voucher to the user includes dispensing the redeemable voucher when the user accepts at least one of the total and the value related to the total by pressing the first button, and wherein returning the coins held in the coin holding area to the user includes returning the coins when the user rejects at least one of the total and the value related to the total by pressing the second button.

63. The method of claim 60 wherein providing a coin counting machine includes providing a coin counting machine in a non-bank retail location, and wherein dispensing a redeemable voucher includes dispensing a voucher that is redeemable for at least one of cash and merchandize in the non-bank retail location.

64. The method of claim 60 wherein displaying at least one of the total and a value related to the total includes displaying the total and the value related to the total, wherein dispensing a redeemable voucher includes dispensing a redeemable voucher that includes an indication of the total and the value related to the total, and wherein the value is less than the total.

65. The method of claim 60 wherein dispensing a redeemable voucher includes dispensing a redeemable voucher that includes anticounterfeiting information.

66. The method of claim 60 wherein displaying at least one of the total and a value related to the total includes displaying the total and the value related to the total, wherein dispensing a redeemable voucher includes dispensing a redeemable voucher that includes at least one of the total and the value related to the total in bar code.

67. The method of claim 60, further comprising cleaning the plurality of coins received from the user before transferring the plurality of coins from the coin input area to the coin discriminator.

68. A system for counting coins, the system comprising: means for receiving a plurality of randomly oriented coins from a user; means for discriminating the plurality of coins to determine a total; means for temporarily holding the plurality of discriminated coins; means for displaying at least one of the total and a value related to the total; means for dispensing a redeemable voucher to the user in response to a first user selection accepting of at least one of the total and the value related to the total; and means for returning the plurality of held coins to the user in response to a second user selection rejecting at least one of the total and the value related to the total.

69. The system of claim 68, further comprising button means for receiving at least one of the first user selection and the second user selection from the user.

70. The system of claim 68 wherein the means for dispensing a redeemable voucher include means for dispensing a voucher that is redeemable for at least one of cash and merchandize in a non-bank retail location.

71. The system of claim 68 wherein the means for receiving a plurality of randomly oriented coins from a user include means for at least substantially simultaneously receiving a plurality of randomly oriented coins of multiple denominations.

72. The system of claim 68, further comprising means for removing debris from the plurality of coins before discriminating the coins to determine a total.

73. The system of claim 68 wherein the means for dispensing a redeemable voucher include means for dispensing a redeemable voucher that includes anticounterfeiting information.
--------------------------------------------------------------------------------

Description

--------------------------------------------------------------------------------


CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This application is a continuation of U.S. patent application Ser. No. 08/689,826, filed Aug. 12, 1996, which is a continuation of U.S. patent application Ser. No. 08/255,539, filed Jun. 6, 1994 (now U.S. Pat. No. 5,564,546), which is a continuation of U.S. application Ser. No. 07/940,931, filed Sep. 4, 1992, abandoned, which applications are incorporated herein in their entireties by reference.

BACKGROUND OF THE INVENTION

[0002] The present invention relates to coupon dispensing machines and coin sorting machines.

[0003] There are a variety of machines which dispense stamps, tickets, coupons, money orders, bank transactions or the like. One type of machine, shown in U.S. Pat. No. 5,039,848 to Raymond Stoken, dispenses coupons in exchange for money. A display area indicates the different coupons available as well as the specific amount of money required to obtain each particular coupon. Money is inserted into the machine via a coin slot. Control circuitry determines which coupon has been selected, the amount of money required to purchase this coupon, and if the correct amount of money has been inserted into the coin slot. The control circuitry then causes the coupon dispenser to dispense the requested coupon.

[0004] Other machines dispense other types of products. For instance, U.S. Pat. No. 5,021,967 to Lawrence Smith is a money order dispensing machine. This machine is meant to be operated by a system operator, not a customer, and therefore does not require the capability to receive money. The machine prints money orders on a dot matrix printer after receiving the necessary data inputs from the operator.

[0005] A different variety of machines has been patented which sort coins. One such machine, shown in U.S. Pat. No. 4,995,848 to David Goh uses two methods to sort coins, both methods based on the diameter of the coins. In this machine the coins are loaded into a hopper. A rotating wheel feeds the coins individually onto an inclined ramp. The coins roll down the ramp with their rear surfaces resting against a support surface. Specific denominations are selected when they fall through slots of varying size located in the support surface. Specific denominations are also selected using peeler knives which are arranged at different distances from the ramp surface. These knives topple the coins from the ramp into bins. Using both techniques allows a short ramp to be employed. Another type of machine shown in U.S. Pat. No. 4,059,122 to Yoshio Kinosh!ta counts the number of coins according to denomination after sorting the coins.

SUMMARY OF THE INVENTION

[0006] The present invention provides an apparatus which can receive a number of unsorted coins. The coins are sorted and counted to determine a total value. The user is issued a voucher for an amount related to the total value.

[0007] The present invention offers a valuable service to the retailer in whose store this machine is placed as well as to the actual user. People tend to collect coins at home, finding that carrying large quantities of coins is unwieldy and impractical. Furthermore, spending coins normally requires either placing the coins singularly into product dispensing machines or counting the coins out by hand. This invention allows the user to periodically exchange excess coins for cash vouchers. The user need not first count the coins since the present invention automatically counts the coins. The advantages to the retailer are numerous. First, although the voucher is exchangeable for cash or merchandise, most customers are likely to purchase goods at the store where they exchange their coins. Second, by offering a convenience to their customers, retailers gain the goodwill of these customers. Thus, the present invention provides a voucher issuing machine in which the amount of the voucher is not preset, and also allows coin sorting by a typical consumer.

[0008] In the preferred embodiment coins are placed in a hinged hopper tray built into one of the machine's surfaces. To activate the process the user presses a "go" button and then lifts one edge of the tray, causing the coins to fall down a chute to the high speed coin sorting and counting mechanism. Coins are counted and sorted by denomination and then dropped into a temporary holding area called an escrow tray. As the coins are counted, the total monetary value is displayed on a video screen as well as the number of coins counted within each denomination. After all of the coins have been counted, the user is asked to make a decision, either rejecting the transaction or allowing the transaction to proceed. If the transaction is rejected, the coins are returned to the user via a return chute. If the transaction is accepted, the coins are dropped into separate bins or trays based upon their denomination. This triggers the controller to print and dispense a cash voucher to the user via a slot in the machine's surface.

[0009] Besides exchanging cash vouchers for coins, in the preferred embodiment the invention dispenses manufacturers' coupons from a separate slot redeemable for various bargains. These coupons are dispensed at no cost to the user. A second type of coupon to be dispensed in the preferred embodiment are store coupons. These coupons are printed by the cash voucher printer and dispensed through the same slot as the cash vouchers and are good only for specific bargains unique to that store. For example, the store manager may have a surplus of a particular item and therefore wish to offer a "two-for-one" bargain for a limited time. Selected products and bargains may also be promoted on the video display. These promotional techniques have the advantage of being easily alterable; thus an individual store manager can tailor the store coupons/ads depending upon factors such as the time of day (e.g., midday grocery store shoppers versus after work shoppers versus late night shoppers) while the chain store owner can vary the store coupons/ads depending upon a particular store's location and needs (e.g., deli shop versus bakery shop versus floral shop).

[0010] Generally, in the prior art, coins are either inserted into a machine singularly, or in the case of large commercial sorting machines, by trained personnel. In the present invention, non-trained personnel will dump large amounts of coins into the hopper tray. These untrained users are likely to empty their personal containers, such as old cans or bottles, directly into the hopper without first inspecting the coins. Thus lint, tokens, and various other objects will probably accompany the coins into the machine. Therefore a method of waste management is necessary to insure that the machine is not damaged during use.

[0011] In the preferred embodiment, the user dumps coins into a hopper tray which doubles as an inspection area. The bottom of the hopper tray is perforated, thus allowing small foreign objects to fall through the perforations instead of entering the coin sorting mechanism. While the coins are in the hopper, the user has an opportunity to remove large foreign objects. After inspecting the coins, the user first presses a "go" button indicating they wish to use the machine, and then lifts one edge of the hinged tray, causing the coins to fall down a waste management chute. This chute leads to the coin sorting and counting mechanism. In the preferred embodiment, when the "go" button is pressed, the coin sorter starts, the coin counter is initialized, and a fan within the waste management chute is activated. The fan blows light weight debris, such as lint and dust, out of the chute and away from the coin counter/sorter mechanism. The bottom surface of the waste management chute is a grooved and porous plate which allows any fluids dumped into the machine to be removed from the coins and collected. This helps to avoid possible damage to the machine. Magnetic strips are placed along the entrance and exit areas of the chute to extract any magnetic tokens which may have been included with the coins.

[0012] Many people have an intrinsic distrust of machines, especially with regards to machines handling their money, and therefore it is desirable to quickly gain the user's trust. This invention has several features which accomplish this goal. First, the front of the machine is clear, encouraging user trust since the flow of coins can be watched throughout the process. Second, until the voucher is issued, the user is in control of the process. Prior to issuing the voucher the display indicates the amount of the coins counted. At this point the user can either agree with the amount and allow the transaction to proceed, or can reject the amount and have the coins returned. Until the user makes this decision, the coins are kept in a temporary holding area called an escrow tray. In the preferred embodiment, the basic escrow tray is immobile although the bottom surface of the tray can be manipulated. Through the manipulation of this surface, the coins are either returned to the user or dumped into a storage bin within the machine.

BRIEF DESCRIPTION OF THE DRAWINGS

[0013] FIG. 1 is an illustration of an embodiment of the coin exchange apparatus in a likely environment.

[0014] FIG. 2 is a diagram showing the internal layout of the principal components in the preferred embodiment.

[0015] FIG. 3 is a block diagram of the system level electronic functions.

[0016] FIG. 4 is a flow chart of the operation of the system.

[0017] FIG. 5 is a flow chart of the operation of a second embodiment of the system.

[0018] FIG. 6 is a block diagram of the stepping motor control circuitry.

[0019] FIG. 7 is a side view of the coin tray and the waste management system.

[0020] FIGS. 8A-B is a diagram of the bottom plate of the waste management system.

[0021] FIG. 9 is a three-dimensional view of the waste management system.

[0022] FIG. 10 is a front view of the escrow tray.

[0023] FIG. 11 is a side view of the escrow tray.

DETAILED DESCRIPTION OF THE SPECIFIC EMBODIMENT(S)

[0024] FIG. 1 is an illustration of the coin exchange kiosk 100 in a possible environment; a supermarket. Kiosk 100 is free-standing, and has been designed with a small footprint to minimize the required floor space. The lower front surface 110 is clear, allowing the user to watch the coins as they are separated, counted, and dropped into escrow tray 105. By making the process visible to the user, trust in the machine is encouraged. Furthermore, since watching the sorting process is interesting, the user becomes integrated into the machine's operation and is further encouraged to use the machine.

[0025] Initially the coins are placed in coin tray 120 where small foreign objects fall through perforations in the bottom of the tray and the user can remove large foreign materials prior to coin sorting. When the user is ready to begin the sorting process, they must push "go" button 115. Button 115 initializes the coin counter, activates the coin sorter, and activates the fan within the waste management chute. If the system does not detect coins within a predetermined period of time, both the coin sorter and the fan are deactivated. The user next raises the edge of tray 120. The tray is hinged on the right side and acts as a chute to funnel the coins into the kiosk. User directions, transaction information, store bargains, and advertisements appear on video screen 130. Screen 130 can also be used to show attention getting displays in order to attract potential users. Once the coins are admitted into the kiosk and the go button has been pushed, the waste removal and coin sorting process begins. During the coin sorting process, coins which do not meet the necessary physical criteria are rejected and returned to the user via chute 165. In the preferred embodiment, as the coins are counted the video screen displays both the total monetary value and the number of coins collected within each denomination.

[0026] At the conclusion of the sorting process, the user is asked to either accept the stated coin value and continue the transaction, or cancel the transaction. This selection is made by pushing one of two buttons 150. If the user continues the transaction, then the coins in the escrow tray 105 are dumped into a depository and the user is issued a voucher through slot 160. In the preferred embodiment, the voucher is worth the value of the counted coins and is redeemable at the retailer's cashier for cash or credit towards purchases. Store coupons, printed by the voucher printer and good towards store bargains, are dispensed with the cash voucher. Manufacturers' coupons are dispensed through an adjoining slot 165 at no cost to the user. If the user cancels the transaction the coins are returned in area 170. The upper back portion 140 of kiosk 100 is a display board where advertisements and notices can be placed. Display board 140 can also be used to indicate what coupons the machine is currently dispensing.

[0027] The internal layout of kiosk 100 is shown in FIG. 2. The coin storage area 210 holds the coins after the transaction has been completed. Area 210 can either be separated into large capacity bins to hold each denomination, or into ready to use coin trays. When the storage area is close to capacity, an indicator 255 on the outside of the kiosk 100 notifies store personnel to empty the storage area 210.

[0028] The outside of the waste management system 230 is visible in this diagram. Liquids fall through the porous, grooved bottom plate of system 230 while lint and other fine materials are blown away by a small fan located in the chute. Liquids are collected in a waste receptacle. At the end of system 230, the coins are funneled into the coin counter and sorter 280. This is a commercially available sorter. Several manufacturers make suitable machines, although in the preferred embodiment a Scan Coin Model 109 with a modified hopper is used. The counter accepts mixed coins and is able to detect foreign coins and slugs. Rejected coins are returned to the user through chute 165.

[0029] Two different printers are used in the preferred embodiment of the kiosk. Printer 270 is used to print the cash vouchers and the store coupons. The preferred embodiment uses an Epson TM267 printer. Besides containing the amount of the voucher, the voucher will also contain other information such as store name, transaction number, bar codes, etc in order to make counterfeiting difficult. Special papers and inks can also be used to discourage counterfeiting. In the preferred embodiment, a separate printer 295 makes a continuous record of each transaction. This printer is an Epson RP265. In a second embodiment printer 270 serves a double function. Besides printing the vouchers, upon command by store personnel this printer prints out all of the pertinent transactional information. CPU 290 also stores this information.

[0030] In the preferred embodiment, VGA screen 250 is a Super VGA monitor; CPU 290 is a Belmont, 386, 40 MHz CPU; and high capacity sheet feeder 260 is a modified 1000 sheet feeder manufactured by Gradco, model number HCF-1000. Warning light 255 warns store personnel when either printer is low on paper, the sheet feeder is low on paper, or there has been a system malfunction.

[0031] FIG. 3 is a block diagram of the system level electronic functions. The entire system is controlled by CPU 290. System information is presented on display 130 which is the same monitor used to communicate with the user. System inputs are coupled to CPU 290 via data bus 380. Push button switches 330 and 325 are used by the user to either accept or cancel the transaction. Switch 335 is a maintenance switch which is used by store personnel to command the system to download system information to either the maintenance printer 295 or to a floppy disk. The maintenance switch may also be used to enter a mode to allow clearing of coin jams and an internal store coin counting mode. This internal store coin counting mode will enable the retailer to sort and count coins from vending machines and cash registers, bypassing the voucher and coupon functions. Leading edge sensor 340 tells the system each time a sheet of coupons has been dispensed. Stepping motor 320 dispenses the coupon sheets. Push button switch 115 is depressed by the user to initialize the counting system and activate both the coin counter/sorter 280 and the waste management fan. Microswitches 350 and 355 deactivate escrow tray stepping motor 360, thus preventing possible mechanical damage by the stepping motor moving the tray past its designated limits, and indicate to CPU 290 the position of the escrow tray (i.e., at-rest position, returning coins to the user position, or dumping coins into the machine's storage area position). CPU 290 also controls the voucher printer 270.

[0032] The flowchart of FIG. 4 illustrates the operation of the coin exchange kiosk in its preferred embodiment. The user places coins of varying denominations into the external tray (step 405). Small foreign matter falls through perforations in the bottom of the hopper tray (step 410) while large foreign matter is removed by the user (step 415). When the user is ready to begin using the machine, they press the "go" button (step 420). Pressing the go button activates the coin sorter, initializes the coin counter, and activates the fan within the waste management chute (step 425). Next the user lifts the edge of the hopper tray, dumping the coins down the entrance chute of the waste management system (step 428). As the coins go through the waste management system certain waste, such as liquids, are removed (step 430). The coins are then counted and sorted (step 440). During this step coins which do not meet the necessary physical criteria are rejected and returned to the user (step 435). As the coins are counted, the value of the coins is displayed on the monitor as well as the number of coins counted within each denomination (step 440). Manufacturers' coupons are dispensed at this time (step 440). After all of the coins are counted, the user is asked to either accept the value that has been determined and continue the transaction or to reject the value and discontinue the transaction (step 450). If the user decides to reject the stated value then the coins are returned (step 455). If the user decides to accept the stated value and continue the transaction then a cash voucher is dispensed for the stated value (step 460).

[0033] The flowchart of FIG. 5 illustrates the operation of the coin exchange kiosk in a second embodiment. The user places coins of varying denominations into the external tray (step 505). Small foreign matter falls through perforations in the bottom of the hopper tray (step 510) while large foreign matter is removed by the user (step 515). When the user is ready to begin using the machine, they press the "go" button (step 520). Pressing the go button activates the coin sorter, initializes the coin counter, and activates the fan within the waste management chute (step 525). Next the user lifts the edge of the hopper tray, dumping the coins down the entrance chute of the waste management system (step 528). As the coins go through the waste management system certain waste, such as liquids, are removed (step 530). The coins are then counted and sorted (step 540). During this step coins which do not meet the necessary physical criteria are rejected and returned to the user (step 535). As the coins are counted, the value of the coins is displayed on the monitor as well as the number of coins counted within each denomination (step 540). Manufacturers' coupons are dispensed at this time (step 540). After all of the coins are counted, the user is asked to either accept the value that has been determined and continue the transaction or to reject the value and discontinue the transaction (step 545). If the user decides to reject the stated value then the coins are returned (step 550) and the transaction ends (step 595).

[0034] If the user decides to accept the stated value and continue the transaction then they are asked whether they would like to donate, in whole or in part, the value of the coins to a charity (step 553). If the user does not wish to donate to a charity then a cash voucher is issued (step 577) and the transaction ends (step 595). If the user wishes to donate to a charity, then the user is asked to chose to which charity they wish to donate (steps 557, 560, 565, and 570). If they do not wish to donate to any of the listed charities, then the transaction ends (step 595) and the coins are returned (step 573).

[0035] After choosing to which charity they wish to donate, the user is asked if they wish to donate the total value of the coins (step 580). If the user wishes to donate the total amount then a receipt is issued which states the amount and the charity (step 583). CPU 290 records the amount donated and the charity (step 583) so that when the coins are removed from kiosk 100 the proper amounts can be deposited to the appropriate charity organizations. If the user selects to donate only a portion of the total amount, they then enter the amount to be donated (step 587). At this point a receipt for the donated portion is issued, a cash voucher for the remainder of the total amount is issued, and CPU 290 records the amount donated and the charity for later disbursement of funds (step 590).

[0036] FIG. 6 is a block diagram of the stepping motor control circuitry for the two stepping motors used in kiosk 100. One stepping motor controls the coupon dispenser and the other stepping motor controls the escrow tray. The circuitry for the two motors are duplicates of one another. The oscillators in blocks 615 and 620 generate the pulses which set the stepping motor rates. The dip switches in blocks 615 and 620 allow manual setting of the oscillator rates. Each motor has a second oscillator, blocks 625 and 630, which set the chopping rate. The step pattern translators, blocks 635 and 640, use both oscillators to generate the step motor patterns. Two different oscillators are used in order to maximize the power efficiency.

[0037] In operation, computer 290 determines when power should be supplied to either the coupon dispenser stepping motor 645 or the escrow tray stepping motor 650. This input is supplied via interface 610. This signal is received by either input selector 655 or 660. In the preferred embodiment, this signal is digital. Depending upon the signal, the selector determines the length of time the stepping motor will be operated. For example, one signal from interface 610 will cause the coupon dispenser (motor 645) to dispense only a single sheet of coupons while a different signal will cause two sheets of coupons to be dispensed. Similarly, one signal from interface 610 will cause the escrow tray (motor 650) to rotate in one direction thereby returning coins to the user, while a different signal will cause the opposite motor rotation thereby depositing the coins into the coin receptacle. The power drive units 665 and 670 supply, upon command, sufficient power to operate stepping motors 645 and 650.

[0038] FIG. 7 is a side view of coin tray 120 and waste management chute 230. Coin tray 120 normally is flush with the top surface of kiosk 100 (Position 710). The user places their coins in the tray and at this point removes any obvious foreign materials. When the user is ready to begin the sorting process, they lift handle 715 on coin tray 120. The tray is hinged at point 730. When tray 120 is in position 720, the coins fall through waste management chute 230. The coins leave chute 230 through opening 740 to enter the coin sorting and counting mechanism. Liquids accidently dropped into the coin hopper are funneled through spout 750 to a suitable collection receptacle.

[0039] FIG. 8A is a diagram of the bottom plate of waste management system 230. FIG. 8B is an enlarged view of a small section of this plate. The surface of the plate has grooves running lengthwise, these grooves forming a series of alternating peaks 810 and valleys 820. The coins ride along the surface of the plate while liquids flow down the valleys 820, eventually flowing through perforations 830 drilled in the bottom of the valleys 820. The liquids are then funneled down spout 750, and collected. The sharp peaks 810, combined with a teflon coating, help minimize the friction caused by the liquids which may accompany the coins. This in turn helps prevent a slow down of the sorting process.

[0040] FIG. 9 is a three dimensional view of the waste management chute 230. The coins enter and travel down the chute in direction 930. As the coins travel down this chute, a fan (not shown) blows air back up the chute in direction 910. Light materials, such as small papers and lint, are blown free from the coins and out of the machine. Liquids flow through the holes in bottom plate 800, flow through spout 750, and are collected in a separate receptacle. Magnetic strips 950 along the exit edge of the coin hopper and the entry edge of the waste management chute collect ferrous objects, such as tokens and slugs, removing them from the coins.

[0041] FIG. 10 is a front view of the escrow tray 105. Tray 105 is divided into four bins. Bin 1010 catches dimes from sorter 280; bin 1020 catches pennies; bin 1030 catches nickels; and bin 1040 catches quarters. Stepping motor 360 drives worm gears 1055 and 1060. When activated, stepping motor 360 moves the bottom surface 1080 of the tray along axis 1070. If the tray bottom 1080 is rotated outward, toward the user, the coins are dumped into a coin storage receptacle. If the tray bottom 1080 is rotated inward, away from the user, then the coins are dumped into a return receptacle.

[0042] FIG. 11 is a side view of the escrow tray 105. Stepping motor 360 drives worm gears 1055 and 1060. When the stepping motor 360 is activated, worm gear 1060 is rotated along axis 1070. When gear 1060 is rotated clockwise, the bottom surface 1080 is rotated allowing the coins to be returned to the user in tray 170. When gear 1060 is rotated counter-clockwise, the bottom surface 1080 is rotated allowing the coins to be dumped into a coin depository. Microswitch 1130 prevents the stepping motor from moving the tray bottom 1080 past its pre-determined stops.

[0043] As will be understood by those familiar with the art, the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. For example, the same printer could be used to print both the vouchers and periodic maintenance reports. Accordingly, disclosure of the preferred embodiments of the invention is intended to be illustrative, but not limiting, of the scope of the invention which is set forth in the following claims.


HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Canadian_Nickle
Penny Hoarding Member



Canada
938 Posts

Posted - 03/01/2007 :  21:10:16  Show Profile Send Canadian_Nickle a Private Message
IU have all the image files that accompany the above 2 patents but they are in tiff fromat so I can't post them here. if you want them let me know and I'll email them to you.


HoardCode0.1: M28/5CAON:CA5Ni27615:CA1Cu1200:CA100Ag345:
CA10Ag250:CA50Ag100:CA25Ag30:CA500Ag48:US100Ag20:CA1000Ag16

How to read a HoardCode:
You must be logged in to see this link.
Go to Top of Page

Ridewithme38
Penny Sorter Member



USA
79 Posts

Posted - 03/01/2007 :  21:48:11  Show Profile  Send Ridewithme38 an AOL message  Send Ridewithme38 a Yahoo! Message Send Ridewithme38 a Private Message
wow that was alot to read

.........................
RUNNING TOTAL:

2223 Copper
43 wheat
20 canadian
1 Guatemala coin?(1979)What is this made of?
and a 250gram .999 pure copper bar(Jetco USA)
Go to Top of Page

n/a
deleted



78 Posts

Posted - 03/03/2007 :  16:31:40  Show Profile Send n/a a Private Message
Last time I went to a coinstar machine, I choose the amazon gift cert (since I buy a lot of stuff there anyway), but it said it had a problem and gave me a no-charge voucher for the whole amount.
Go to Top of Page

Cerulean
Penny Hoarding Member



USA
993 Posts

Posted - 03/05/2007 :  10:18:27  Show Profile Send Cerulean a Private Message
quote:
Originally posted by Canadian_Nickle

And then is the post office. In most post offices, located in the lobby is an automated stamp vending machine. The interesting thing about this vending machine, is it gives you your change in Dollar and Fifty-Cent coins! So if you have some change you would like to ..um.. “change” go to the post office at around Midnight (or when the PO is really dead) and find the stamp machine. Pumped in all of your pennies, nickels, dimes, and quarters. I selected to buy one 39 cent stamp and hit the coin return.

I did this over the weekend. Converted $14 worth of quarters into shiny new Washington dollars (and a stamp).

--------------------------
Penny Search Totals:
881 zincs (1982-2006) 77.1%
254 coppers (1959-1982) 22.2%
6 wheats (1940-1952)
1 dime (2004)
Go to Top of Page
  Previous Topic Topic Next Topic  
 Forum Locked
 Printer Friendly
Jump To:
Classic Realcent Archives © 2000-2010 Realcent.org Go To Top Of Page
This page was generated in 1.09 seconds. Powered By: ForumCo v3.4.05
RSS Feed 1 RSS Feed 2
Powered by ForumCo 2000-2008
TOS - AUP - URA - Privacy Policy